Security researcher hired by New York Times says an "overwhelming percentage" of hacks originate from a 12-story building in Shanghai associated with the Chinese military.
In a 3-2 vote, the agency decides to apply the same rules that govern telephone service to broadband, with the hope that it ensures the fair and equal treatment of all traffic on the Internet.
Commentary: The new regulatory action by the FCC has sweeping implications for the Internet, and the price we will pay over time for this radical shift will be severe.
One day after the FCC adopted new Net neutrality rules, consumers are left scratching their heads about what it means for their Web-surfing experience. Has anything really changed?
The Defense Department will be allowed to distribute iPhones and iPads with Apple's iOS 6 to employees, though that doesn't guarantee Apple will actually receive contracts.
Since 1980, the Army has depended on the Abrams for battlefield superiority in combat. As part of Road Trip 2013, CNET's Daniel Terdiman checked out how these battle-tested vehicles are forged.
Don't look for Google to run a large-scale network. Instead it's teaming up with wireless carriers, as it does with hardware makers for Nexus devices.
By not properly vetting the Superfish adware, Lenovo became the most recent unwitting example of broken links in the software supply chain.
With its new Instagram account, the U.S. Transportation Security Administration shows images of weaponry that people either forgot they had or tried to sneak past airport agents.
Thousands of companies are providing intelligence organizations with data such as vulnerabilities and equipment specifications, sources tell Bloomberg.